Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 18:10
Static task
static1
Behavioral task
behavioral1
Sample
Rensenware.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Rensenware.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Rensenware_forcer.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Rensenware_forcer.exe
Resource
win10v2004-20220812-en
General
-
Target
Rensenware.exe
-
Size
96KB
-
MD5
60335edf459643a87168da8ed74c2b60
-
SHA1
61f3e01174a6557f9c0bfc89ae682d37a7e91e2e
-
SHA256
7bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a
-
SHA512
b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb
-
SSDEEP
3072:kGXc7vE4k8sWJnmiWpJtCkGwJ1ED7qztG:RXD8sWBmiW0wX6Gx
Malware Config
Signatures
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Rensenware.exedescription ioc process File created C:\Users\Admin\Pictures\SetMove.png.RENSENWARE Rensenware.exe File created C:\Users\Admin\Pictures\CopyCheckpoint.raw.RENSENWARE Rensenware.exe File created C:\Users\Admin\Pictures\ExportUnblock.png.RENSENWARE Rensenware.exe File created C:\Users\Admin\Pictures\ProtectEnable.png.RENSENWARE Rensenware.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Rensenware.exedescription pid process target process PID 1956 wrote to memory of 960 1956 Rensenware.exe dw20.exe PID 1956 wrote to memory of 960 1956 Rensenware.exe dw20.exe PID 1956 wrote to memory of 960 1956 Rensenware.exe dw20.exe